Description
Course “Mastering Linux with Enhanced Security” (SELinux). This course will help you understand and use SELinux. SELinux is a valuable addition to standard Linux security options to keep your Linux distribution secure. This course starts with the basics of SELinux and covers more advanced topics such as SELinux, Multi-Level Security (MLS) and Multi-Class Security (MCS), and managing SELinux with Ansible. It also covers SELinux in container environments in detail. This course includes labs throughout the course so you can observe SELinux in real time and practice while learning. The main features of the course are:
- Understand when and how SELinux is needed
- Learn how to troubleshoot problems with SELinux.
- Make your application SELinux compatible
- Implement military-grade security with SELinux MLS and MCS.
- This course is also a complete resource for students who want to fully understand SELinux in preparation for any Red Hat Enterprise Linux-related exam, as well as for application developers and administrators who want to use SELinux. achieve the highest possible level of security.
What you will learn:
- SELinux Basics: Covers basic concepts such as mandatory access control, how to enable SELinux, understanding context tags, managing context tags, and using booleans.
- SELinux Analysis: Teaches SELinux analysis, covering troubleshooting and showing how to analyze Boolean values and rules.
- Using User Programs with SELinux: Shows user programs with SELinux and describes how to work with SELinux modules and how to make each program SELinux compatible.
- Military-Grade Security for SELinux and MLS Users: Contains three lessons on the best type of protection and security that SELinux offers. It covers how SELinux is used in military organizations, as well as topics related to SELinux users, how to manage layered security, and how to use layered security.
- Configuring SELinux for Containers: Describes how to fully secure your container environment by adding SELinux.
- Managing SELinux with Ansible: Covers how to secure containers with SELinux and how to manage SELinux with Ansible.
This course is suitable for people who:
- DevOps engineers
- DevSecOps engineers
- Software developers
- manager
Course details
- Publisher: Oreily
- From: Sander van Vugt
- Level of training: from beginner to advanced
- Duration of training: 5 hours 21 minutes
Course headings
- Introduction
- Mastering Security Enhanced Linux (SELinux): Introduction
- Module 1: SELinux Basics
- module introduction
- Lesson 1: Mandatory Access Control
- Learning Objectives
- 1.1 How SELinux works
- 1.2 Mandatory access control requirement
- 1.3 Understanding SELinux and Discretionary Access Control
- Lesson 1. Laboratory work. Studying SELinux settings.
- Lesson 1. Laboratory solution. Studying SELinux settings.
- Lesson 2: Enabling SELinux
- Learning Objectives
- 2.1 Managing states and modes in Red Hat
- 2.2 Installing SELinux on Ubuntu
- 2.3 Understanding policies
- Lesson 2. Laboratory work. SELinux state management.
- Lesson 2. Laboratory solution. SELinux state management.
- Lesson 3: Understanding Context Labels
- Learning Objectives
- 3.1 Displaying context labels
- 3.2 Understanding when to set context labels
- 3.3 Using the audit log to investigate problems
- 3.4. Understanding Context Inheritance
- Lesson 3. Laboratory work. Exploring SELinux events.
- Lesson 3. Laboratory solution. Exploring SELinux events.
- Lesson 4: Managing Context Labels
- Learning Objectives
- 4.1 Finding the right context
- 4.2 Setting context for files
- 4.3 Setting up context for ports
- 4.4 Using custom types
- 4.5 Setting Apache DocumentRoot to something other than default
- Lesson 4. Laboratory work. Running SSH on port 443.
- Lesson 4. Laboratory solution. Running SSH on port 443.
- Lesson 5: Using Boolean Values
- Learning Objectives
- 5.1 Understanding Boolean Values
- 5.2 Using boolean values
- 5.3 Searching for boolean values
- Lesson 5. Laboratory work. Setting up vsftpd for anonymous booting
- Lesson 5. Laboratory solution. Setting up vsftpd for anonymous booting
- Module 2: SELinux Analysis
- module introduction
- Lesson 6: Troubleshooting SELinux
- Learning Objectives
- 6.1 Troubleshooting SELinux
- 6.2. Understanding Audit Logs
- 6.3 Understanding Dontaudit rules
- 6.4 Using Audit2allow
- 6.5 Use of sealant
- 6.6 Booting SELinux manually
- Lesson 6: SELinux Troubleshooting Lab
- Lesson 6. Laboratory solution. Troubleshooting SELinux.
- Lesson 7: Analyzing Boolean Values and Rules
- Learning Objectives
- 7.1 Policy analysis
- 7.2 Terminology
- 7.3 Using search
- 7.4 Using seinfo
- 7.5. Find out what your domain can do
- 7.6 Logical value analysis
- 7.7 Analysis of transition rules
- Lesson 7: Laboratory Study of Boolean Values
- Lesson 7. Laboratory solution. Study of logical values.
- Module 3: Using Custom Applications with SELinux
- module introduction
- Lesson 8: SELinux Modules
- Learning Objectives
- 8.1 Module management
- 8.2 Writing custom modules
- 8.3 Creating custom modules
- Lesson 8. Laboratory work. Using modules in your application.
- Lesson 8. Laboratory solution. Including modules in your application.
- Lesson 9: How to make any application work with SELinux
- Learning Objectives
- 9.1 Understanding the ability to launch custom applications
- 9.2 Use of unrestricted domains
- 9.3 Using run-on to launch applications with a specific context
- 9.4 Using sepolgen to create application policy modules
- Lesson 9. Laboratory work. Run any application on SELinux.
- Lesson 9. Laboratory solution. Run any application on SELinux.
- Module 4: Military-grade security for SELinux and MLS users.
- module introduction
- Lesson 10: SELinux Users
- Learning Objectives
- 10.1 Understanding users and roles
- 10.2 Mapping Linux users to SELinux users
- 10.3 Using Boolean Values to Manage SELinux Users
- 10.4 Root restrictions
- Lesson 10 Lab Creating a Kiosk User
- Lesson 10. Laboratory solution. Creating a kiosk user.
- Lesson 11: Using Multi-Level Security (MLS)
- Learning Objectives
- 11.1 Understanding MLS and MCS
- 11.2 Enabling MLS Policy
- 11.3 Creating a user with permission level
- 11.4 Understanding what to do with directories
- Lesson 11. Lab using MLS
- Lesson 11: Lab solution using MLS
- Lesson 12: Using Multi-Category Security (MCS)
- Learning Objectives
- 12.1 Understanding MCS
- 12.2 Grouping users and applications using MCS
- 12.3 Merging MLS and MCS
- Lesson 12. Laboratory work. Setting up MCS.
- Lesson 12. Laboratory solution. Setting up MCS.
- Module 5: SELinux, containers and Ansible
- module introduction
- Lesson 13: SELinux and containers
- Learning Objectives
- 13.1 Understanding the needs of a SELinux container
- 13.2 Setting up access to container storage
- 13.3 Using udica to configure container access
- Lesson 13 Lab Configuring SELinux for Containers
- Lesson 13. Laboratory solution. Configuring SELinux for containers.
- Lesson 14: Using Ansible to Manage SELinux
- Learning Objectives
- 14.1 Using SELinux Ansible modules
- 14.2 Using the RHEL system role to manage SELinux
- Lesson 14. Laboratory work. Using Ansible to manage SELinux.
- Lesson 14. Laboratory solution. Using Ansible to manage SELinux.
- Summary
- Mastering Security-Enhanced Linux (SELinux): Summary
Course Prerequisites
- Install and configure the lab environment. This could be a Linux virtual machine running virtualization software on the participant’s own computer using software such as VMware Workstation or Oracle VirtualBox, or on a dedicated computer. https://learning.oreilly.com/videos/red-hat-certified/9780134723990/
- Install a virtual or physical machine running the latest version of Red Hat Enterprise Linux, CentOS Stream, Rocky Linux, or Fedora.
course images
Example video course
installation instructions
Once extracted, watch using your favorite player.
Subtitles: No
Quality: 720p
Download link
Password for file(s): www.downloadly.ir
size
944 MB